CVE-2025-22073

In the Linux kernel, the following vulnerability has been resolved: spufs: fix a leak on spufs_new_file() failure It's called from spufs_fill_dir(), and caller of that will do spufs_rmdir() in case of failure. That does remove everything we'd managed to create, but... the problem dentry is still negative. IOW, it needs to be explicitly dropped.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Oct 2025, 20:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spufs: se corrige una fuga en caso de fallo de spufs_new_file(). Se llama desde spufs_fill_dir(), y quien lo llama ejecutará spufs_rmdir() en caso de fallo. Esto elimina todo lo que habíamos creado, pero el problema de dentry sigue siendo negativo. Es decir, debe eliminarse explícitamente.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b - () https://git.kernel.org/stable/c/0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b - Patch
References () https://git.kernel.org/stable/c/132925bd6772d7614340fb755ac5415462ac8edd - () https://git.kernel.org/stable/c/132925bd6772d7614340fb755ac5415462ac8edd - Patch
References () https://git.kernel.org/stable/c/35f789ccebd69f6f9a1e0a9b85435003b2450065 - () https://git.kernel.org/stable/c/35f789ccebd69f6f9a1e0a9b85435003b2450065 - Patch
References () https://git.kernel.org/stable/c/53b189651c33b5f1fb3b755e6a37a8206978514e - () https://git.kernel.org/stable/c/53b189651c33b5f1fb3b755e6a37a8206978514e - Patch
References () https://git.kernel.org/stable/c/90d1b276d1b1379d20ad27d1f6349ba9f44a2e00 - () https://git.kernel.org/stable/c/90d1b276d1b1379d20ad27d1f6349ba9f44a2e00 - Patch
References () https://git.kernel.org/stable/c/96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0 - () https://git.kernel.org/stable/c/96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0 - Patch
References () https://git.kernel.org/stable/c/b1eef06d10c1a9848e3a762919bbbe315a0a7cb4 - () https://git.kernel.org/stable/c/b1eef06d10c1a9848e3a762919bbbe315a0a7cb4 - Patch
References () https://git.kernel.org/stable/c/d1ca8698ca1332625d83ea0d753747be66f9906d - () https://git.kernel.org/stable/c/d1ca8698ca1332625d83ea0d753747be66f9906d - Patch
References () https://git.kernel.org/stable/c/d791985ceeb081155b4e96d314ca54c7605dcbe0 - () https://git.kernel.org/stable/c/d791985ceeb081155b4e96d314ca54c7605dcbe0 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401

16 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:16

Updated : 2025-10-31 20:43


NVD link : CVE-2025-22073

Mitre link : CVE-2025-22073

CVE.ORG link : CVE-2025-22073


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime